Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Exploits

EtherHiding (Exploit Technique)

June 18, 2024
Reading Time: 2 mins read
in Exploits, Malware
EtherHiding (Exploit Technique)

EtherHiding

Type of Threat

Exploit 

Date of initial activity

2023

Motivation

Financial Gain

Attack Vectors

Web Browsing

Targeted Systems

Windows

Overview

In the rapidly evolving landscape of cyber threats, EtherHiding has emerged as a novel and sophisticated method for delivering malware. This innovative technique exploits the capabilities of cryptocurrency platforms to obscure and propagate malicious code. EtherHiding operates by embedding harmful scripts within smart contracts on platforms such as Binance’s Smart Chain, leveraging the trust and complexity of blockchain technology to bypass traditional security defenses. As cryptocurrency platforms gain prominence, the use of such methods is expected to rise, posing significant challenges for cybersecurity professionals. The core concept behind EtherHiding involves using smart contracts, which are self-executing contracts with the terms of the agreement directly written into code. By manipulating these contracts, threat actors can conceal malicious payloads within seemingly innocuous transactions or smart contract interactions. This method not only disguises the true nature of the malware but also capitalizes on the inherent trust in blockchain transactions, making detection and prevention more challenging. Once the smart contract is interacted with, the malicious code is triggered, often leading to the deployment of additional payloads. One prevalent tactic observed with EtherHiding involves the use of Fake-Updates, where users are deceived into downloading what they believe are legitimate software updates. These fake updates, which mimic the appearance of updates for commonly used applications like web browsers, prompt users to execute the malicious code, thereby initiating the infection process.

Targets

Individuals

How they operate

The attack begins when a user interacts with a compromised smart contract on a cryptocurrency platform. These smart contracts, which are designed to execute automatically based on pre-defined conditions, are manipulated to include malicious code. The attacker embeds harmful scripts within these contracts, disguised as routine operations or legitimate transactions. When a user engages with these contracts, the hidden malware is activated, initiating the attack chain. A common method employed in EtherHiding attacks is the use of Fake-Updates. This tactic involves tricking users into downloading and executing what they believe to be legitimate software updates. Typically, these fake updates mimic the appearance of updates for popular applications, such as web browsers. The fake update prompts users with a misleading interface, urging them to execute malicious code disguised as a software update. Once the fake update is executed, the malware is installed on the victim’s system. In recent cases, this has included infostealers like Lumma, which are designed to extract sensitive information from the compromised system. The malware might use deceptive names and disguise itself to avoid detection. For instance, the malicious payload might masquerade as a commonly known application like MetaTrader5, further complicating detection efforts.
References
  • EtherHiding and Fake-Updates Used to Deliver Malware
Tags: BlockchainCryptocurrencyCyber threatsEtherHidingExploitLummaMalware
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

Subscribe to our newsletter

    Latest Incidents

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial